Chapter 2 Flashcards

1
Q

The Concept of System Security

A

A secure system must deliver its intended behaviours and outcomes while avoiding unintended ones that may lead to unacceptable asset loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User Intent

A

User intent refers to the system delivering behavious and outcomes expected by the user, which is a key aspect of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Design Intent

A

Design intent implies that the system should meet the behaviours and outcomes defined in its design, which is another key aspect of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Primary Security Goal

A

The primary security goal is to ensure that the only intended behaviours and outcomes take place within and through the system. Every security requirement stems from this objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mediated Access

A

Mediated access means controlling access by enforcing constraints and following non-conflicting rules, a fundamental principle in trustworthy secure design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Policies

A

Security policies define the scope of control, bounds for application, and rules governing the behaviour and outcomes of subjects, objects, and operations. They are derived from various sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trustworthiness and Security Policies

A

Trustworthiness depends on the accuracy, consistency, compatibility, and completeness of security policy rules. Inconsistencies or gaps can lead to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adequately Secure System

A

An adequately secure system possesses resilience to adversity, behaviour and outcome control, and rule-based access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Resilience to Adversity

A

Resilience to adversity implies that a secure system can deliver its intended capabilities even when facing deliberate or accidental adversities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rule-Based Access Control

A

Rule-based access control involves enforcing rules to permit authorised human-to-machine and machine-to-machine interactions while ensuring behaviour and outcome control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Determining Adequate Security

A

Adequate security depends on evidence-based assessments that optimise security while considering performance objectives and constraints. It is context-dependent and subjective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As Secure as Reasonable Practicable (ASARP)

A

Being ASARP means increasing security further would result in disproportionate costs, schedule delays, or unacceptable compromises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Protective Failure

A

Protective failure involves detaching form an insecure state or impending transition to one and taking responsive actions to prevent further failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protective Recovery

A

Protective recovery focuses on transitioning from an insecure state to a secure state or a less insecure one while preventing further state transitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Characteristics of Systems

A

The security and trustworthiness of systems are influenced by various characteristics, interactions with other systems, and their roles within a system of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Criticality of a System

A

The level of importance or criticality of a system within its context can influence the rigor and extent of security measures.

17
Q

Ramifications of System Failure

A

Understanding the consequences of a system’s failure is essential in shaping security requirements.

18
Q

Approach to System Acquisition

A

How a system is acquired, whether developed, bought, or reused, affects the security strategies and considerations.

19
Q

Value and Sensitivity of Assets

A

The value, sensitivity, and criticality of assets entrusted to and used by the system directly relate to security requirements.

20
Q

Concept of Assets

A

Assets are valuable items or entities, categorised as tangible (physical) and intangible (non-physical)

21
Q

Valuation of Assets

A

Valuing an asset is crucial for making decisions about investing in its protection, but varying stakeholder perspectives may need to be reconciled.

22
Q

The Concepts of Loss and Loss Control

A

Loss refers to the experience of an asset being taken away or destroyed. Loss control objectives guide decisions on loss prevention and mitigation to protect asset characteristics.

22
Q

Addressing Loss

A

Addressing loss involves the implementation of protective measures to ensure that only authorised and intended behaviours and outcomes occur within the system

23
Q

Structured Reasoning about Asset Loss

A

A structured approach to reasoning about asset loss involves elements like the context of loss, significance of loss, confidence in addressing loss, cause of loss, and addressing loss.

23
Q

Evidence-Based Assurance

A

Demonstrating confidence in addressing loss relies on evidence that is well-documented and evolves as the system develops. Assurance cases show how system features and capabilities create a solid evidence base.

23
Q

Systems Security Engineering

A

Systems security engineering is a specialised branch of systems engineering that takes a holistic approach to ensure the success of secure systems throughout their entire lifecycle, considering various aspects like risk assessment, cost-benefit analysis, and transdisciplinary approaches.

23
Q

Required Capability vs Protection Capability

A

When demonstrating adequate security, one must consider both the required capability (what the system is designed to do) and the protection capability (security features).

23
Q

Limits of Certainty

A

Being aware of potential errors, gaps, or inconsistencies in requirements is crucial when demonstrating adequate security, as it’s impossible to guarantee the absence of all loss due to uncertainty.